CN114417393B - File encryption method, system, electronic equipment and computer readable storage medium - Google Patents
File encryption method, system, electronic equipment and computer readable storage medium Download PDFInfo
- Publication number
- CN114417393B CN114417393B CN202111493801.2A CN202111493801A CN114417393B CN 114417393 B CN114417393 B CN 114417393B CN 202111493801 A CN202111493801 A CN 202111493801A CN 114417393 B CN114417393 B CN 114417393B
- Authority
- CN
- China
- Prior art keywords
- file
- encryption request
- management server
- encryption
- information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 42
- 238000004590 computer program Methods 0.000 claims description 12
- 238000004891 communication Methods 0.000 claims description 2
- 238000010586 diagram Methods 0.000 description 7
- 238000005516 engineering process Methods 0.000 description 3
- 230000003993 interaction Effects 0.000 description 3
- 230000004044 response Effects 0.000 description 3
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/604—Tools and structures for managing or administering access control systems
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Health & Medical Sciences (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Bioethics (AREA)
- Automation & Control Theory (AREA)
- Storage Device Security (AREA)
Abstract
The application discloses a file encryption method, a file encryption system, electronic equipment and a computer readable storage medium. The method is applied to the permission management client based on the Linux system and comprises the following steps: acquiring a first encryption request, wherein the first encryption request at least comprises a first file to be encrypted; generating a corresponding second encryption request based on the first encryption request; sending a second encryption request to the authority management server so that the authority management server returns a corresponding release license; and encrypting the first file to be encrypted by using the issuing license so as to obtain a second file. By the method, the file can be encrypted across the operating systems.
Description
Technical Field
The present application relates to the field of encryption technologies, and in particular, to a file encryption method, system, electronic device, and computer-readable storage medium.
Background
With the popularization of computers, users only need to record information in the computers to generate corresponding files, and paper archiving is not needed.
The user can copy the file as long as he has a right to read the file, and can propagate the copied file at will, which is very disadvantageous to information security.
Disclosure of Invention
In order to solve the above problems, the present application provides a file encryption method, system, electronic device, and computer-readable storage medium, which can implement cross-operating system file encryption.
In order to solve the technical problem, the application adopts a technical scheme that: the file encryption method is applied to a permission management client based on a Linux system and comprises the following steps: acquiring a first encryption request, wherein the first encryption request at least comprises a first file to be encrypted; generating a corresponding second encryption request based on the first encryption request; sending a second encryption request to the authority management server so that the authority management server returns a corresponding release license; and encrypting the first file to be encrypted by using the issuing license so as to obtain a second file.
The first encryption request further comprises authority information corresponding to the first file;
generating a corresponding second encryption request based on the first encryption request, comprising:
generating key information in response to the first encryption request;
a corresponding second encryption request is generated based on the key information and the rights information.
Wherein generating the key information comprises: generating a content key; and encrypting the content key by using the public key of the authority management server to obtain key information.
Wherein generating the content key comprises: a symmetric key is generated as the content key using the lockbox.
Wherein, send the second encryption request to the authority management server, in order to make the authority management server return the corresponding issue permit, including: sending a second encryption request to the authority management server so that the authority management server encrypts the key information and the authority information to generate an issuing license; and receiving the issuing license sent by the authority management server.
Wherein the second encryption request is an AD RMS encryption request; the right management server encrypts the key information and the right information, and the method comprises the following steps: the rights management server performs AD RMS encryption of the key information and the rights information.
Wherein, obtaining the first encryption request comprises: acquiring a first encryption request sent by a file system; the method further comprises the following steps: and sending the second file to the file system.
In order to solve the above technical problem, another technical solution adopted by the present application is: there is provided an encryption system comprising: the method comprises the steps that a permission management client based on a Linux system is used for obtaining a first encryption request, wherein the first encryption request at least comprises a first file to be encrypted; generating a corresponding second encryption request based on the first encryption request; the right management server is in communication connection with the right management client and is used for receiving a second encryption request sent by the right management client and generating a release license based on the second encryption request; the right management client is also used for receiving the issuing license sent by the right management server and encrypting the first file to be encrypted by using the issuing license so as to obtain a second file.
In order to solve the above technical problem, another technical solution adopted by the present application is: there is provided an electronic device comprising a processor and a memory coupled to the processor, wherein the memory stores a computer program, and the processor is configured to execute the computer program to implement the method according to the above technical solution.
In order to solve the above technical problem, another technical solution adopted by the present application is: there is provided a computer readable storage medium storing a computer program which, when executed by a processor, implements the method as provided in the above solution.
The beneficial effects of the embodiment of the application are that: different from the prior art, the file encryption method provided by the application is applied to the permission management client based on the Linux system, and comprises the following steps: acquiring a first encryption request, wherein the first encryption request at least comprises a first file to be encrypted; generating a corresponding second encryption request based on the first encryption request; sending a second encryption request to the right management server so that the right management server returns a corresponding release license; and encrypting the first file to be encrypted by using the issuing license so as to obtain a second file. Through the method, the file encryption is realized by utilizing the interaction between the permission management client based on the Linux system and the permission management server, and compared with the interaction between the Windows system and the permission management server in the related technology, the method for encrypting the file is added, and the file encryption is realized by crossing the operating systems.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present application, the drawings needed to be used in the description of the embodiments are briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present application, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts. Wherein:
FIG. 1 is a schematic flowchart of a first embodiment of a file encryption method provided in the present application;
FIG. 2 is a flowchart illustrating a second embodiment of a file encryption method provided in the present application;
FIG. 3 is a schematic flow chart diagram illustrating an embodiment of step 22 provided herein;
FIG. 4 is a schematic diagram of an embodiment of an encryption system provided in the present application;
FIG. 5 is a schematic view of an application scenario of the file encryption method provided in the present application;
FIG. 6 is a schematic structural diagram of an embodiment of an electronic device provided in the present application;
FIG. 7 is a schematic structural diagram of an embodiment of a computer-readable storage medium provided in the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application. It is to be understood that the specific embodiments described herein are merely illustrative of the application and are not limiting of the application. It should be further noted that, for the convenience of description, only some of the structures related to the present application are shown in the drawings, not all of the structures. All other embodiments obtained by a person of ordinary skill in the art based on the embodiments in the present application without making any creative effort belong to the protection scope of the present application.
Reference herein to "an embodiment" means that a particular feature, structure, or characteristic described in connection with the embodiment can be included in at least one embodiment of the application. The appearances of the phrase in various places in the specification are not necessarily all referring to the same embodiment, nor are separate or alternative embodiments mutually exclusive of other embodiments. It is explicitly and implicitly understood by one skilled in the art that the embodiments described herein can be combined with other embodiments.
Referring to fig. 1, fig. 1 is a schematic flowchart of a first embodiment of a file encryption method provided in the present application. The method is applied to the permission management client based on the Linux system, and comprises the following steps:
step 11: obtaining a first encryption request, wherein the first encryption request at least comprises a first file to be encrypted.
Wherein the first encryption request is sent by the file system. The file system may generate OFFICE files such as Word files, excel files, and PowerPoint files. In some embodiments, the file system may also generate text files, batch files, and the like.
The file system may be formed based on a Windows system, or may be formed based on any one of an android system, an iOS system, and a hongmeng system.
Step 12: based on the first encryption request, a corresponding second encryption request is generated.
In some embodiments, a first file to be encrypted in the first encryption request may be encrypted to obtain an encrypted first file, and then a corresponding second encryption request may be generated based on the encrypted first file.
Step 13: and sending a second encryption request to the right management server so that the right management server returns the corresponding issuing license.
In some embodiments, if the file in the second encryption request is encrypted, the rights management server can decrypt it and then encrypt the decrypted file to generate the publishing license.
Step 14: and encrypting the first file to be encrypted by using the issuing license so as to obtain a second file.
At this time, the issue license is merged with the first file to be encrypted, which is equivalent to encrypting the first file to be encrypted. The issuance license is used to specify the usage right of the first file by the user.
In an application scene, a permission management client acquires a first encryption request sent by a file system; then generating a corresponding second encryption request based on the first encryption request; sending a second encryption request to the right management server so that the right management server returns a corresponding release license; and encrypting the first file to be encrypted by using the issuing license to obtain a second file, and then sending the second file to the file system.
In this embodiment, by obtaining a first encryption request, the first encryption request at least includes a first file to be encrypted; generating a corresponding second encryption request based on the first encryption request; sending a second encryption request to the authority management server so that the authority management server returns a corresponding release license; the method comprises the steps of encrypting a first file to be encrypted by using a release license to obtain a second file, and encrypting the file by using the way that a file system interacts with a permission management client based on a Linux system and the way that the permission management client based on the Linux system interacts with a permission management server.
Referring to fig. 2, fig. 2 is a schematic flowchart of a second embodiment of a file encryption method provided in the present application. The method is applied to the permission management client based on the Linux system, and comprises the following steps:
step 21: acquiring a first encryption request, wherein the first encryption request at least comprises a first file to be encrypted and authority information corresponding to the first file.
Wherein the first encryption request is sent by the file system.
Step 22: in response to the first encryption request, key information is generated.
Referring to fig. 3, step 22 may be the following process:
step 221: a content key is generated.
Specifically, the rights management client generates a symmetric key as the content key using the lockbox.
The symmetric key encryption algorithm may be any one of DES, 3DES, IDEA, RC5, and RC 6. The content key is used for encrypting the first file to be encrypted and/or the authority information corresponding to the first file.
Step 222: and encrypting the content key by using the public key of the authority management server to obtain key information.
And the right management client encrypts the content key by using the public key of the right management server to obtain key information.
It can be understood that the public key of the right management server is stored in advance in the right management client. The right management server has a private key corresponding to the public key, and can decrypt the key information.
Step 23: a corresponding second encryption request is generated based on the key information and the rights information.
And the right management client generates a corresponding second encryption request based on the key information and the right information.
Step 24: and sending a second encryption request to the authority management server so that the authority management server encrypts the key information and the authority information to generate the release license.
And the right management client sends a second encryption request to the right management server.
In the process, the right management server can decrypt the key information by using the corresponding private key to obtain the content key.
The rights management server then encrypts the content key and rights information using its public key.
The right management server adds the encrypted content key and the right information to the issue license. The right management server signs the publishing license using its private key, generating a publishing license.
Step 25: and receiving the issuing license sent by the right management server.
And the right management client receives the issuing license sent by the right management server.
Step 26: and encrypting the first file to be encrypted by using the issuing license so as to obtain a second file.
And the right management client encrypts the first file to be encrypted by using the issuing license so as to obtain a second file. And the authority management client sends the second file to the file system. At this point, the file system obtains the encrypted file.
In an application scenario, the second encryption request is an AD RMS encryption request; the rights management server performs AD RMS encryption of the key information and the rights information.
Wherein the rights management server is an RMS server.
In the embodiment, the file system interacts with the permission management client based on the Linux system, and the permission management client based on the Linux system interacts with the permission management server to encrypt the file.
Referring to fig. 4, fig. 4 is a schematic structural diagram of an embodiment of an encryption system provided in the present application. The encryption system 40 includes a Linux system based rights management client 41 and a rights management server 42. The rights management client 41 and the rights management server 42 are communicatively connected.
The rights management client 41 is configured to obtain a first encryption request, where the first encryption request at least includes a first file to be encrypted; generating a corresponding second encryption request based on the first encryption request; a second encryption request is sent to the rights management server 42.
The rights management server 42 is configured to generate a publishing license based on the second encryption request and return the publishing license to the rights management client 41.
The right management client 41 is further configured to encrypt the first file to be encrypted with the publishing license to obtain a second file.
The right management client 41 and the right management server 42 are further configured to implement the technical solution of any of the above embodiments, and are not described herein.
In an application scenario, the following is explained with reference to fig. 5:
when the file system generates the corresponding first file, it generates a first encryption request and sends the first encryption request to the rights management client 41.
The rights management client 41 generates a corresponding second encryption request based on the first encryption request. Specifically, the first encryption request further includes authority information corresponding to the first file;
the right management client 41 generates key information in response to the first encryption request; a corresponding second encryption request is then generated based on the key information and the rights information.
The right management client 41 uses the cipher box to generate a symmetric key as a content key, and then uses the public key of the right management server to encrypt the content key to obtain key information.
The rights management client 41 then sends a second encryption request to the rights management server 42.
After the right management server 42 receives the second encryption request, the right management server 42 decrypts the key information, such as the content key and the right information, by using the private key, and then encrypts the content key and the right information by using the public key of the right management client 41, thereby generating the publishing license.
The rights management server 42 transmits the issue license to the rights management client 41.
The right management client 41 encrypts the first file to be encrypted with the issue license to obtain the second file.
Wherein the second encryption request is an AD RMS encryption request; the rights management server 42 is an RMS server. The rights management server 42 performs AD RMS encryption on the key information and the rights information.
The rights management client 41 sends the second file to the file system.
When the file system needs to read the second file, a read request is sent to the rights management client 41, and the rights management client 41 issues a license to the rights management server 42.
The right management server 42 decrypts the content password in the issue license using the private key of the right management client 41.
The rights management server 42 encrypts the content key using the user's public key.
The encrypted content key and the use right key of the user are added to the use license, and the right management server 42 signs the use license using the private key of the right management client 41 and then sends the use license to the right management client 41.
The rights management client 41 decrypts the private key of the holding user with the private key of the lockbox rights management client. The content key is then decrypted using the user's private key. The lockbox then decrypts the second file using the content key.
Referring to fig. 6, fig. 6 is a schematic structural diagram of an embodiment of an electronic device provided in the present application. The electronic device 60 comprises a processor 61 and a memory 62 coupled to the processor 61, wherein a computer program is stored in the memory 62, and the processor 61 is configured to execute the computer program to implement the following method:
acquiring a first encryption request, wherein the first encryption request at least comprises a first file to be encrypted; generating a corresponding second encryption request based on the first encryption request; sending a second encryption request to the right management server so that the right management server returns a corresponding release license; and encrypting the first file to be encrypted by using the issuing license so as to obtain a second file.
It can be understood that the processor 61 is further configured to execute the computer program to implement the method according to any of the above embodiments, which is specifically referred to any of the above technical solutions and is not described herein again.
Referring to fig. 7, fig. 7 is a schematic structural diagram of an embodiment of a computer-readable storage medium provided in the present application. The computer-readable storage medium 70 stores a computer program 71, the computer program 71, when executed by a processor, implementing the method of:
acquiring a first encryption request, wherein the first encryption request at least comprises a first file to be encrypted; generating a corresponding second encryption request based on the first encryption request; sending a second encryption request to the right management server so that the right management server returns a corresponding release license; and encrypting the first file to be encrypted by using the issuing license so as to obtain a second file.
It can be understood that, when being executed by a processor, the computer program 71 is further configured to implement the method according to any of the embodiments, which please refer to any of the above technical solutions specifically, which is not described herein again.
In summary, the file encryption method provided by the present application is applied to a rights management client based on a Linux system, and the method includes: acquiring a first encryption request, wherein the first encryption request at least comprises a first file to be encrypted; generating a corresponding second encryption request based on the first encryption request; sending a second encryption request to the right management server so that the right management server returns a corresponding release license; and encrypting the first file to be encrypted by using the issuing license so as to obtain a second file. Compared with the method of interaction between the Windows system and the authority management server in the related technology, the method for encrypting the file is added, and the file encryption is realized by crossing the operating systems.
In the several embodiments provided in the present application, it should be understood that the disclosed method and apparatus may be implemented in other manners. For example, the above-described device embodiments are merely illustrative, and for example, the division of the modules or units is only one logical division, and other divisions may be realized in practice, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one position, or may be distributed on multiple network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the embodiment.
In addition, functional units in the embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units may be integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
The above description is only for the purpose of illustrating embodiments of the present application and is not intended to limit the scope of the present application, and all modifications of equivalent structures and equivalent processes, which are made according to the content of the present specification and the accompanying drawings, or which are directly or indirectly applied to other related technical fields, are also included in the scope of the present application.
Claims (6)
1. A file encryption method is applied to a permission management client based on a Linux system, and comprises the following steps:
acquiring a first encryption request sent by a file system, wherein the first encryption request at least comprises a first file to be encrypted and authority information corresponding to the first file; the file system is formed on the basis of any one of a Windows system, an android system, an iOS system and a Hongmon system;
generating a content key based on the first encryption request;
encrypting the content key by using a public key of the authority management server to obtain key information;
generating a corresponding second encryption request based on the key information and the authority information;
sending the second encryption request to a right management server so that the right management server encrypts the key information and the right information based on the second encryption request to generate an issuing license;
receiving the issue license sent by the right management server;
encrypting the first file to be encrypted by using the issuing license to obtain a second file;
and sending the second file to the file system.
2. The method of claim 1,
the generating of the content key includes:
a symmetric key is generated as the content key using a lockbox.
3. The method of claim 1,
the second encryption request is an AD RMS encryption request;
the right management server encrypts the key information and the right information, and the right management server comprises:
the right management server performs AD RMS encryption on the key information and the right information.
4. A cryptographic system, the cryptographic system comprising:
the method comprises the steps that a permission management client based on a Linux system is used for obtaining a first encryption request sent by a file system, wherein the first encryption request at least comprises a first file to be encrypted and permission information corresponding to the first file; and generating a content key based on the first encryption request; encrypting the content key by using a public key of the authority management server to obtain key information; generating a corresponding second encryption request based on the key information and the authority information; the file system is formed on the basis of any one of a Windows system, an android system, an iOS system and a Hongmon system;
the right management server is in communication connection with the right management client and is used for receiving the second encryption request sent by the right management client, encrypting the key information and the right information based on the second encryption request and generating an issuing license;
the right management client is also used for receiving the issuing license sent by the right management server and encrypting the first file to be encrypted by using the issuing license to obtain a second file; and sending the second file to the file system.
5. An electronic device, characterized in that the electronic device comprises a processor and a memory coupled to the processor, in which a computer program is stored, the processor being configured to execute the computer program to implement the method according to any of claims 1-3.
6. A computer-readable storage medium, characterized in that the computer-readable storage medium stores a computer program which, when executed by a processor, implements the method of any one of claims 1-3.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111493801.2A CN114417393B (en) | 2021-12-08 | 2021-12-08 | File encryption method, system, electronic equipment and computer readable storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111493801.2A CN114417393B (en) | 2021-12-08 | 2021-12-08 | File encryption method, system, electronic equipment and computer readable storage medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN114417393A CN114417393A (en) | 2022-04-29 |
CN114417393B true CN114417393B (en) | 2023-04-07 |
Family
ID=81265176
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202111493801.2A Active CN114417393B (en) | 2021-12-08 | 2021-12-08 | File encryption method, system, electronic equipment and computer readable storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN114417393B (en) |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101211387A (en) * | 2006-12-31 | 2008-07-02 | 深圳市酷开网络科技有限公司 | File protection method |
CN103701611A (en) * | 2013-12-30 | 2014-04-02 | 天地融科技股份有限公司 | Method for accessing and uploading data in data storage system |
CN104753925A (en) * | 2015-03-11 | 2015-07-01 | 华中科技大学 | Gateway system and method for encrypting and decoding files |
CN111342961A (en) * | 2020-03-04 | 2020-06-26 | 贵州弈趣云创科技有限公司 | Method for realizing data cross-platform sharing by configuring key pair |
Family Cites Families (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103581196B (en) * | 2013-11-13 | 2016-05-11 | 上海众人网络安全技术有限公司 | Distributed document transparent encryption method and transparent decryption method |
US9800579B2 (en) * | 2015-02-12 | 2017-10-24 | Verizon Patent And Licensing Inc. | Network-based client side encryption |
WO2017210563A1 (en) * | 2016-06-02 | 2017-12-07 | Reid Consulting Group, Inc. | System and method for securely storing and sharing information |
CN107332666A (en) * | 2017-08-17 | 2017-11-07 | 创元网络技术股份有限公司 | Terminal document encryption method |
US20200287880A1 (en) * | 2019-03-08 | 2020-09-10 | Alltana, Inc. | Data encryption |
CN113268715A (en) * | 2020-02-14 | 2021-08-17 | 中移(苏州)软件技术有限公司 | Software encryption method, device, equipment and storage medium |
CN113497787B (en) * | 2020-03-20 | 2022-12-13 | 阿里巴巴集团控股有限公司 | File transmission method, equipment and system |
CN112395627A (en) * | 2020-11-20 | 2021-02-23 | 深圳麦风科技有限公司 | Encryption and decryption method, device and storage medium |
-
2021
- 2021-12-08 CN CN202111493801.2A patent/CN114417393B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101211387A (en) * | 2006-12-31 | 2008-07-02 | 深圳市酷开网络科技有限公司 | File protection method |
CN103701611A (en) * | 2013-12-30 | 2014-04-02 | 天地融科技股份有限公司 | Method for accessing and uploading data in data storage system |
CN104753925A (en) * | 2015-03-11 | 2015-07-01 | 华中科技大学 | Gateway system and method for encrypting and decoding files |
CN111342961A (en) * | 2020-03-04 | 2020-06-26 | 贵州弈趣云创科技有限公司 | Method for realizing data cross-platform sharing by configuring key pair |
Non-Patent Citations (3)
Title |
---|
Charles Fracchia.Secure and Scalable Collection of Biomedical Data for Machine Learning Applications.《Artificial Neural Networks》.2020,第第2190卷卷317-336. * |
孔素真 等.一种具有数字版权保护功能的多媒体社交网络平台.《河南大学学报(自然科学版)》.2015,第第45卷卷(第第45卷期),360-366. * |
廖力.云计算中数据可靠与安全存储技术研究冗余去重加密备份系统设计.《中国优秀硕士学位论文全文数据库 信息科技辑》.2018,(第undefined期),I138-45. * |
Also Published As
Publication number | Publication date |
---|---|
CN114417393A (en) | 2022-04-29 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109144961B (en) | Authorization file sharing method and device | |
AU2017223158B2 (en) | Blockchain-implemented method for control and distribution of digital content | |
US7792300B1 (en) | Method and apparatus for re-encrypting data in a transaction-based secure storage system | |
US7320076B2 (en) | Method and apparatus for a transaction-based secure storage file system | |
CN113806777B (en) | File access realization method and device, storage medium and electronic equipment | |
CN105580311A (en) | Data security using request-supplied keys | |
CN105103119A (en) | Data security service | |
US10140460B2 (en) | File storage system and user terminal | |
EP3984161B1 (en) | Cryptographic key generation using external entropy generation | |
US20200403810A1 (en) | Validation data structure for decentralized identity claim | |
KR20170087663A (en) | Apparatus for performing on behalf an electronic signature for client terminal and operating method thereof | |
US20150143107A1 (en) | Data security tools for shared data | |
US10671748B2 (en) | Secrets as a service | |
CN105122265A (en) | Data security service system | |
US11258601B1 (en) | Systems and methods for distributed digital rights management with decentralized key management | |
WO2015107641A1 (en) | Encryption system, key generating device, re-encryption device, and user terminal | |
KR102394608B1 (en) | Digital Rights Management System using Attribute-based Encryption | |
CN114091058A (en) | Method and system for secure sharing of data between a first area and a second area | |
CN112989320B (en) | User state management system and method for password equipment | |
CN114417393B (en) | File encryption method, system, electronic equipment and computer readable storage medium | |
WO2018236351A1 (en) | Symmetrically encrypt a master passphrase key | |
EP4322470A1 (en) | Data encryption system and method | |
US20240106657A1 (en) | Method and apparatus for posting a user message of a user in an internet forum | |
Ge et al. | A security scheme of digital rights management based on agent encryption and key distribution in cloud computing | |
Motegaonkar et al. | To develop secure deduplication of data using hybrid cloud methodology |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |